CN106844599B - A kind of personalized privacy information search method based on data mapping - Google Patents

A kind of personalized privacy information search method based on data mapping Download PDF

Info

Publication number
CN106844599B
CN106844599B CN201710028191.6A CN201710028191A CN106844599B CN 106844599 B CN106844599 B CN 106844599B CN 201710028191 A CN201710028191 A CN 201710028191A CN 106844599 B CN106844599 B CN 106844599B
Authority
CN
China
Prior art keywords
data
retrieval
buyer
puppet
referring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710028191.6A
Other languages
Chinese (zh)
Other versions
CN106844599A (en
Inventor
王晓玲
赵大鹏
李财政
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
East China Normal University
Original Assignee
East China Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by East China Normal University filed Critical East China Normal University
Priority to CN201710028191.6A priority Critical patent/CN106844599B/en
Publication of CN106844599A publication Critical patent/CN106844599A/en
Application granted granted Critical
Publication of CN106844599B publication Critical patent/CN106844599B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of personalized privacy information search methods based on data mapping, the both parties of data trade platform negotiate the reference column retrieved, the seller carries out puppet ID number to its data record and carries out data mapping, and it is encrypted to obtain referring to column data ciphertext using irreversible encryption algorithm, send jointly to buyer, buyer obtains inquiry referring to column data ciphertext using identical irreversible encryption algorithm, inquiry obtains corresponding puppet ID, (k-1) M false puppet ID is generated according to privacy requirement parameter k, then the corresponding puppet ID building k anonymity set of retrieval data needed for (k-1) M false puppet ID and M is sent to the seller, the data record collection that retrieval obtains is sent to buyer by the seller, needed for buyer filters out in retrieval record set according to its true retrieval referring to the corresponding puppet ID of column data Retrieval record, obtains search result.It may be implemented to retrieve content to buyer using the present invention and be intended to the good protection of privacy.

Description

A kind of personalized privacy information search method based on data mapping
Technical field
The invention belongs to the technical field of information retrieval in data trade, more specifically, are related to a kind of based on data The personalized privacy information search method of mapping.
Background technique
As the network information technology develops rapidly, all trades and professions constantly increase the demand of data, whether in science Boundary is still intended to the available data for meeting production and research in industry, and data play in people's lives More and more important role.The every profession and trades such as government department, establishment or research institution require a large amount of data input to expire The miscellaneous demand of foot, but data be it is complicated, changeable, therefore, every profession and trade, which just needs to search for from mass data, to be had Meet itself needs with information.But it is likely to result in letting out for the individual commercial intention for inquiring content privacy and issuer in this way Dew, in terms of consequent is various solution private informations (such as daily habits, bad history, prestige degree, previous medical history) Research, to ensure that the utilization of information while meeting industry requirement can guarantee that individual privacy and commercial intention are not let out Dew.Exactly such demand makes safe and reliable data trade platform come into being, and it is hidden to provide protection data subject for user Private security privacy platform.
Most representative in the data retrieval model of various protection privacies is privacy information retrieval protection model, privacy Years of researches are passed through in information retrieval, have formd the theoretical system of comparatively perfect.Although there is also certain for certain methods Defect, but with the solution of some critical issues, privacy information retrieval will be applied to every field, many industries more and more The interests of provider and the commercial interest of issuer are inquired in order to protect data, introduce privacy information search method.
After entering big data era, various data are constantly merged, and each great institutions have enough data, still When they want to inquire data by other mechanisms, they are not desired to the data to stick one's chin out to data providing, however right In there is no effective solution methods in the current industry of such demand.
Summary of the invention
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of personalized privacy letters based on data mapping Search method is ceased, realizes and content is retrieved to buyer and is intended to the good protection of privacy.
For achieving the above object, the present invention is based on the personalized privacy information search methods of data mapping, including with Lower step:
S1: the both parties of data trade platform negotiate the reference column R retrieved;
S2: the data record in its database is carried out puppet ID and numbered by the seller, to the number in every data record referring to column R It is encrypted to obtain according to using irreversible encryption algorithm referring to column data ciphertext, the pseudo- ID and reference that the seller records every data Column data ciphertext is sent to buyer;
S3: buyer extracts in the data oneself to be retrieved referring to the corresponding data of column R, using it is identical with the seller not Irreversible cryptographic algorithm is encrypted, and obtains retrieval referring to column data in received pseudo- ID and referring to inquiry in column data ciphertext Then the corresponding puppet ID of ciphertext generates (k-1) M false puppet ID, wherein k indicates the privacy requirement parameter of buyer, and k > 1, M are indicated Buyer retrieves referring to column data number, and (k-1) M vacation puppet ID is anonymous with to retrieval reference column data corresponding puppet ID composition k Set, is sent to the seller;
S4: the seller according to transmitted by buyer come k anonymity set, in its database retrieval obtain data record collection, send out Give buyer;
S5: buyer records referring to the corresponding puppet ID of column data in retrieval after receiving retrieval record set according to its true retrieval Retrieval record, obtains search result needed for concentration filters out.
The present invention is based on the personalized privacy information search method of data mapping, the both parties of data trade platform negotiate The reference column retrieved, the seller carries out puppet ID number to its data record and carries out data mapping, and is calculated using irreversible encryption Method is encrypted to obtain referring to column data ciphertext, sends jointly to buyer, and buyer is obtained using identical irreversible encryption algorithm Inquiry obtains corresponding puppet ID referring to column data ciphertext, inquiry, generates (k-1) M false puppet ID according to privacy requirement parameter k, so The corresponding puppet ID building k anonymity set of retrieval data needed for (k-1) M false puppet ID and M is sent to the seller afterwards, the seller will examine The data record collection that rope obtains is sent to buyer, and buyer records referring to the corresponding puppet ID of column data in retrieval according to its true retrieval Retrieval record, obtains search result needed for concentration filters out.It may be implemented to retrieve content to buyer and be intended to hidden using the present invention Private good protection.
Detailed description of the invention
Fig. 1 is that the present invention is based on the specific embodiment flow charts of the personalized privacy information search method of data mapping.
Specific embodiment
A specific embodiment of the invention is described with reference to the accompanying drawing, preferably so as to those skilled in the art Understand the present invention.Requiring particular attention is that in the following description, when known function and the detailed description of design perhaps When can desalinate main contents of the invention, these descriptions will be ignored herein.
Embodiment
Fig. 1 is that the present invention is based on the specific embodiment flow charts of the personalized privacy information search method of data mapping. As shown in Figure 1, the present invention is based on the specific steps of personalized privacy information search method of data mapping to include:
S101: both parties negotiate retrieval referring to column:
The both parties of data trade platform negotiate reference column R, such as identification card number, cell-phone number retrieved etc..It is logical This mode is crossed, retrieval reference column can be determined according to the self-demand situation of buyer and the data of seller offer situation, from And provide personalized information retrieval.
S102: the seller is based on data mapping encrypting data:
Data record in its database is carried out puppet ID number by the seller, to the data in every data record referring to column R It is encrypted to obtain referring to column data ciphertext using irreversible encryption algorithm, pseudo- ID that the seller records every data and referring to column Data ciphertext is sent to buyer.
Pseudo- ID number is exactly to carry out Unified number to data record, can be considered as and be mapped data record, will be every Data record is indicated with puppet ID.Remember that the data record quantity in vendor data library is N in the present embodiment, puppet ID is Then pseudo- ID is sent to buyer then the pseudo- ID of data record is 0-N-1 by natural number.Obviously, pseudo- ID is equally distributed, Thus have ignored the distribution situation of real data, it is therefore prevented that the problem of according to data distribution steal information.Table 1 is this reality Seller's stored data in example is applied to record.
Table 1
As shown in table 1, the seller preserves 1000 datas record in the present embodiment, therefore its puppet ID is 0-999.
The seller needs to add referring to the data of column R using irreversible encryption algorithm in every data record in the present invention It is close to obtain referring to column data ciphertext, it is assumed that the reference column R selected in the present embodiment is PhoneNum, then needs to each The characteristics of PhoneNum is encrypted, irreversible encryption algorithm can not exactly decrypt to obtain original plaintext according to ciphertext.This implementation Irreversible encryption is carried out using SHA (Secure Hash Algorithm, secure hash algorithm) 256 Encryption Algorithm in example, it should Algorithm can be any kind of data conversion at 256 data summarizations, and two different data will not generate same number According to abstract.By taking PhoneNum " 15955592645 " as an example, the ciphertext that uses SHA256 Encryption Algorithm to obtain for "3BE481CA29E74A01 367CEACA 0B5C7F5E E53E9A40 7D26D436 8EDD5395 41F7B13C".This is close Text be it is irreversible, this ciphertext cannot be changed into cell-phone number.The pseudo- ID and ginseng that every data is recorded to the seller in the present invention It is sent to buyer according to column data ciphertext, vendor data safety can be effectively ensured.
S103: buyer generates query set:
Buyer extracts in the data oneself to be retrieved referring to the corresponding data of column R, using it is identical with the seller can not Reverse encryption algorithm is encrypted, and in received pseudo- ID and referring to inquiry in column data ciphertext to obtain retrieval close referring to column data Then the corresponding puppet ID of text generates (k-1) M false puppet ID, wherein k indicates the privacy requirement parameter of buyer, and k > 1, M expression are bought Side's retrieval constitutes k anonymity set referring to column data number, by (k-1) M vacation puppet ID puppet ID corresponding with retrieval reference column data, It is sent to the seller.
Table 2 is the retrieval of buyer in the present embodiment referring to column data and corresponding puppet ID.
Id PhoneNum
0 15253592634
1 18753594256
2 18625562646
3 15642592185
4 15955592792
Table 2
As shown in table 2, in the present embodiment, need to inquire 5 data, corresponding puppet ID is 0,1,2,3,4.K=is set 2, it is therefore desirable to which the mantissa data bulk of generation is 5, that is, generates 5 false puppet ID, k anonymity is constituted together with the age data in table 1 Set.Table 3 is the k anonymity set in the present embodiment.
Id
0
8
10
2
25
1
3
105
4
101
Table 3
As it can be seen that after buyer is retrieved reference column data using the same manner progress irreversible encryption in the present invention, according to Ciphertext inquires to obtain pseudo- ID, and regeneration vacation puppet ID constitutes k anonymity set together, in this way when transmitting retrieval data, transmission Not retrieval is referring to column data, but special distribution characteristics or other data characteristics is not present in puppet ID, pseudo- ID data, even if by The retrieval for being also difficult to obtain buyer is stolen referring to column data.And due to joined false puppet ID, the seller will not learn buyer's True retrieval content and intention privacy, strengthen the protection to buyer.
S104: seller information retrieval and feedback:
The seller according to transmitted by buyer come k anonymity set retrieve obtain data record collection in its database, and send To buyer.
S105: buyer obtains search result:
After buyer receives retrieval record set, according to its true retrieval referring to the corresponding puppet ID of column data in retrieval record set In filter out needed for retrieval record, obtain search result.
From the above description, it can be seen that both parties are retrieved through consultation referring to column, Lai Shixian customized information in the present invention Retrieval, the data record in its database is carried out puppet ID number to realize that data map by the seller in retrieving, then will It is encrypted referring to column data using irreversible encryption algorithm, buyer encrypts retrieval referring to column data, filters out retrieval It referring to the corresponding puppet ID of column data ciphertext, is sent to the seller and retrieves, to solve in privacy information retrieval in retrieval Hold and be intended to Privacy Protection.
Although the illustrative specific embodiment of the present invention is described above, in order to the technology of the art Personnel understand the present invention, it should be apparent that the present invention is not limited to the range of specific embodiment, to the common skill of the art For art personnel, if various change the attached claims limit and determine the spirit and scope of the present invention in, these Variation is it will be apparent that all utilize the innovation and creation of present inventive concept in the column of protection.

Claims (2)

1. a kind of personalized privacy information search method based on data mapping, which comprises the following steps:
S1: the both parties of data trade platform negotiate the reference column R retrieved;
S2: the data record in its database is carried out puppet ID and numbered by the seller, is adopted to the data in every data record referring to column R It is encrypted to obtain referring to column data ciphertext with irreversible encryption algorithm, pseudo- ID that the seller records every data and referring to columns Buyer is sent to according to ciphertext;
S3: buyer is extracted in the data oneself to be retrieved referring to the corresponding data of column R, using identical with the seller irreversible Encryption Algorithm is encrypted, and obtains retrieval referring to column data ciphertext in received pseudo- ID and referring to inquiry in column data ciphertext Then corresponding puppet ID generates (k-1) M false puppet ID, wherein k indicates the privacy requirement parameter of buyer, and k > 1, M indicate buyer Retrieval constitutes k anonymity set, hair referring to column data number, by (k-1) M vacation puppet ID puppet ID corresponding with retrieval reference column data Give the seller;
S4: the seller according to transmitted by buyer come k anonymity set retrieve obtain data record collection in its database, as retrieval Record set is sent to buyer;
S5: after buyer receives retrieval record set, according to its true retrieval referring to the corresponding puppet ID of column data in retrieval record set In filter out needed for retrieval record, obtain search result.
2. personalization privacy information search method according to claim 1, which is characterized in that the irreversible encryption algorithm Using SHA256 Encryption Algorithm.
CN201710028191.6A 2017-01-13 2017-01-13 A kind of personalized privacy information search method based on data mapping Active CN106844599B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710028191.6A CN106844599B (en) 2017-01-13 2017-01-13 A kind of personalized privacy information search method based on data mapping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710028191.6A CN106844599B (en) 2017-01-13 2017-01-13 A kind of personalized privacy information search method based on data mapping

Publications (2)

Publication Number Publication Date
CN106844599A CN106844599A (en) 2017-06-13
CN106844599B true CN106844599B (en) 2019-06-21

Family

ID=59123382

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710028191.6A Active CN106844599B (en) 2017-01-13 2017-01-13 A kind of personalized privacy information search method based on data mapping

Country Status (1)

Country Link
CN (1) CN106844599B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107454070B (en) * 2017-07-24 2019-06-25 华东师范大学 A kind of personalized privacy information search method based on block chain
CN108768608B (en) * 2018-05-25 2020-05-12 电子科技大学 Privacy protection identity authentication method supporting thin client under block chain PKI
CN110858251B (en) * 2018-08-22 2020-07-21 阿里巴巴集团控股有限公司 Data query method and device
CN110457945B (en) * 2019-08-01 2021-03-02 卫盈联信息技术(深圳)有限公司 List query method, query party device, service party device and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101017559A (en) * 2007-03-09 2007-08-15 成都死海盐疗健康馆服务有限公司 Method for establishing business trading web platform and trade term decided by buyer
CN101178801A (en) * 2006-12-20 2008-05-14 腾讯科技(深圳)有限公司 Network trading method and system
CN105718818A (en) * 2016-03-07 2016-06-29 卫晓东 Personal information secrecy method and personal information secrecy system for internet shopping

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101178801A (en) * 2006-12-20 2008-05-14 腾讯科技(深圳)有限公司 Network trading method and system
CN101017559A (en) * 2007-03-09 2007-08-15 成都死海盐疗健康馆服务有限公司 Method for establishing business trading web platform and trade term decided by buyer
CN105718818A (en) * 2016-03-07 2016-06-29 卫晓东 Personal information secrecy method and personal information secrecy system for internet shopping

Also Published As

Publication number Publication date
CN106844599A (en) 2017-06-13

Similar Documents

Publication Publication Date Title
CN107454070B (en) A kind of personalized privacy information search method based on block chain
CN106127075B (en) Encryption method can search for based on secret protection under a kind of cloud storage environment
CN106909617B (en) A kind of personalized privacy information search method based on data fitting
CN106844599B (en) A kind of personalized privacy information search method based on data mapping
Guo et al. Fine-grained database field search using attribute-based encryption for e-healthcare clouds
CN109784931B (en) Query method of data query platform based on blockchain
CN1776701B (en) Techniques for defining, using and manipulating rights management data structures
CN106687984B (en) Device and method for Data Matching and anonymization
CN105723681B (en) For protecting partner's coding of the anonymous link of consumer privacy
CN102713995A (en) Confidential search system and encryption processing system
CN105592085B (en) The method for secret protection of facing position perception recommender system
CN104102483A (en) Method and system for securely using public services for private or enterprise purposes
CN109361644A (en) A kind of Fog property base encryption method for supporting fast search and decryption
Zhang et al. Privacyasst: Safeguarding user privacy in tool-using large language model agents
CN110765488B (en) Data storage and reading method and electronic equipment
JP2001265771A (en) Device and method for managing personal information and recording medium recording program for executing the device or method
CN108377319A (en) picture transmission method and device
CN114091062A (en) Occupational data processing method and device
Hussain et al. Sharing is caring–design and demonstration of a data privacy tool for interorganizational transfer of data
CN111597582B (en) Method for constructing encrypted inverted rectangular tree and space keyword query method
Rai et al. Pseudonymization techniques for providing privacy and security in EHR
Vidhya et al. Fusion-based advanced encryption algorithm for enhancing the security of Big Data in Cloud
Swathi et al. Virtual Health Assistant
Yogeshwar et al. Building dynamic permutation based privacy preservation model with block chain technology for IoT healthcare sector
US20100145807A1 (en) Device for management of personal data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant